Sign Up

Sign Up to our social questions and Answers Engine to ask questions, answer people’s questions, and connect with other people.

Have an account? Sign In

Have an account? Sign In Now

Sign In

Login to our social questions & Answers Engine to ask questions answer people’s questions & connect with other people.

Sign Up Here

Forgot Password?

Don't have account, Sign Up Here

Forgot Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Have an account? Sign In Now

You must login to ask a question.

Forgot Password?

Need An Account, Sign Up Here

Please briefly explain why you feel this question should be reported.

Please briefly explain why you feel this answer should be reported.

Please briefly explain why you feel this user should be reported.

Sign InSign Up

The Archive Base

The Archive Base Logo The Archive Base Logo

The Archive Base Navigation

  • SEARCH
  • Home
  • About Us
  • Blog
  • Contact Us
Search
Ask A Question

Mobile menu

Close
Ask a Question
  • Home
  • Add group
  • Groups page
  • Feed
  • User Profile
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Buy Points
  • Users
  • Help
  • Buy Theme
  • SEARCH
Home/ Questions/Q 520153
In Process

The Archive Base Latest Questions

Editorial Team
  • 0
Editorial Team
Asked: May 13, 20262026-05-13T08:06:55+00:00 2026-05-13T08:06:55+00:00

I want A computer to responsible for execute the command, and B computer will

  • 0

I want “A” computer to responsible for execute the command, and “B” computer will send the command to “A” computer. I have some ideas on the implementation.

Way1:
The “A” computer have a while true loop to listen for “B” computer’s command, when it is received, it execute.

Way2:
Using a FTP Server, that store information that about the command.
The “A” computer have a while true loop to check whether the “B” computer uploaded any new information about the command. if yes, reconstruct the command and execute. After executed, the file on FTP Server will be deleted. And store a copy the “A” computer.

Way3:
this is similar to way2, but using database to store. After the command is executed, it will made as executed.

What is your suggestion about these 3 ways? Is that secure enough?

  • 1 1 Answer
  • 0 Views
  • 0 Followers
  • 0
Share
  • Facebook
  • Report

Leave an answer
Cancel reply

You must login to add an answer.

Forgot Password?

Need An Account, Sign Up Here

1 Answer

  • Voted
  • Oldest
  • Recent
  • Random
  1. Editorial Team
    Editorial Team
    2026-05-13T08:06:55+00:00Added an answer on May 13, 2026 at 8:06 am

    You’re assuming a trust relationship without giving any clues as to how you know that the payload from computer A is benign. How do you plan to prevent computer A from sending a task that says “reformat your hard drive after plundering it for all bank accounts and passwords?

    1. AKA write a socket listener on computer B and let computer A connect to it. No security here.
    2. FTP just saves you from having to write the transport protocol.
    3. Database for persistence instead of file store – nothing new here.

    None of your options have any security, so it’s hard to say which one is more secure. FTP requires that the user know the URL of your FTP server and, if you aren’t allowing anonymous access, a username and password. That makes 2 more secure than 1. 2 and 3 are equally (in)secure.

    All can work, but all are risky. I see little or no security here.

    • 0
    • Reply
    • Share
      Share
      • Share on Facebook
      • Share on Twitter
      • Share on LinkedIn
      • Share on WhatsApp
      • Report

Sidebar

Ask A Question

Stats

  • Questions 282k
  • Answers 282k
  • Best Answers 0
  • User 1
  • Popular
  • Answers
  • Editorial Team

    How to approach applying for a job at a company ...

    • 7 Answers
  • Editorial Team

    What is a programmer’s life like?

    • 5 Answers
  • Editorial Team

    How to handle personal stress caused by utterly incompetent and ...

    • 5 Answers
  • Editorial Team
    Editorial Team added an answer This is what i did: IF EXISTS(SELECT * FROM sys.database_role_members… May 13, 2026 at 3:59 pm
  • Editorial Team
    Editorial Team added an answer If I read your code correctly you are trying to… May 13, 2026 at 3:59 pm
  • Editorial Team
    Editorial Team added an answer This was driving me mad so I went for a… May 13, 2026 at 3:59 pm

Related Questions

I am responsible for a Delphi/Win32 project management application. I have just completed a
I'm looking for a good IDE for C++ that has most or all of
(See end for summary of updated question.) I want to convey to groups of
Is it possible for a computer to learn a regular expression by user-provided examples?
I'm working on a Parse::RecDescent grammar to read a given human-readable set of rules

Trending Tags

analytics british company computer developers django employee employer english facebook french google interview javascript language life php programmer programs salary

Top Members

Explore

  • Home
  • Add group
  • Groups page
  • Communities
  • Questions
    • New Questions
    • Trending Questions
    • Must read Questions
    • Hot Questions
  • Polls
  • Tags
  • Badges
  • Users
  • Help
  • SEARCH

Footer

© 2021 The Archive Base. All Rights Reserved
With Love by The Archive Base

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.